Compromise Detection
Attackers, especially APT group can spend a long time within a compromised network without detection, cyber-attacks by threat actors with special goals, such as stealing, spying, or disrupting cause losses of enterprises and brand crisis. Indicators of Compromise(IOC) can help SOC teams in enterprises to discover and remediate cyber-attacks with essential clues or evidence.
You are able to accurately find out the compromised host in your network with our 99.9% high-fidelity intelligence.
Query Parameters
Premium API key. Unique identifier for API request.
You are able to get the key on "My API" page of threatbook.io.
Kindly note:
Please check if you have bound your access IP to the key and have the authority quotas to access this API before you interact with it.
Single IP address or Domain name to query.
You are allowed to query an IP address with a port to get more accurate intelligence, for example:
-
IPv4 with port to query:
183.18.2.4:8080
-
IPv6 with port to query:
[2001:0db8:0000:0000:0001:0000:0000:0000]:80
Response
The response is of type object
.